{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:18:46Z","timestamp":1767183526600},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T00:00:00Z","timestamp":1467158400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10207-016-0339-8","type":"journal-article","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T10:16:03Z","timestamp":1467195363000},"page":"559-576","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Certificateless and identity-based authenticated asymmetric group key agreement"],"prefix":"10.1007","volume":"16","author":[{"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Jiangtao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,29]]},"reference":[{"key":"339_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: ASIACRYPT 2003, LNCS, vol. 2894, pp. 452\u2013473 (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"339_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, LNCS, vol. 3494, pp. 440\u2013456 (2005)","DOI":"10.1007\/11426639_26"},{"key":"339_CR3","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemp. Math. 324, 71\u201390 (2003)","journal-title":"Contemp. Math."},{"key":"339_CR4","doi-asserted-by":"crossref","unstructured":"Boyd, C., Gonz\u00e1lez-Nieto, J.: Round-optimal contributory conference key agreement. In: PKC 2003, LNCS, vol. 2567, pp. 161\u2013174 (2003)","DOI":"10.1007\/3-540-36288-6_12"},{"key":"339_CR5","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer. ISBN:3-540-43107-1. 9, 10 (2003)","DOI":"10.1007\/978-3-662-09527-0"},{"key":"339_CR6","doi-asserted-by":"crossref","unstructured":"Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: PKC 2004, LNCS, vol. 2947, pp. 115\u2013129 (2004)","DOI":"10.1007\/978-3-540-24632-9_9"},{"key":"339_CR7","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/501983.502018","volume":"2001","author":"E Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. ACM CCS 2001, 255\u2013264 (2001)","journal-title":"ACM CCS"},{"key":"339_CR8","doi-asserted-by":"crossref","unstructured":"Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: EUROCRYPT 1994, LNCS, vol. 950, pp. 275\u2013286 (1995)","DOI":"10.1007\/BFb0053443"},{"key":"339_CR9","doi-asserted-by":"crossref","unstructured":"Choi, K., Hwang, J., Lee, D.: Efficient ID-based group key agreement with bilinear maps. In: PKC 2004, LNCS, vol. 2947, pp. 130\u2013144 (2004)","DOI":"10.1007\/978-3-540-24632-9_10"},{"key":"339_CR10","doi-asserted-by":"crossref","unstructured":"Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: PKC 2008, LNCS, vol. 4939, pp. 344\u2013359 (2008)","DOI":"10.1007\/978-3-540-78440-1_20"},{"issue":"5","key":"339_CR11","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1109\/TIT.2008.920224","volume":"54","author":"R Dutta","year":"2008","unstructured":"Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory 54(5), 2007\u20132025 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"339_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi: 10.1109\/TPDS.2015.2506573","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"339_CR13","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword Rranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190\u2013200 (2015)","journal-title":"IEICE Trans. Commun."},{"key":"339_CR14","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO 1999, LNCS, vol. 1666, pp. 537\u2013554 (1999)","DOI":"10.1007\/3-540-48405-1_34"},{"key":"339_CR15","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. In: EUROCRYPT 2013, LNCS, vol. 7881, pp. 1\u201317 (2013)","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"339_CR16","doi-asserted-by":"crossref","unstructured":"Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W.: Certificateless signature revisited. In: ACISP 2007, LNCS, vol. 4586, pp. 308\u2013322 (2007)","DOI":"10.1007\/978-3-540-73458-1_23"},{"key":"339_CR17","first-page":"180","volume":"2005","author":"J Katz","year":"2005","unstructured":"Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. ACM CCS 2005, 180\u2013189 (2005)","journal-title":"ACM CCS"},{"key":"339_CR18","doi-asserted-by":"crossref","unstructured":"Langlois, A., Stehl\u00e9, D., Steinfeld, R.: GGHLite: More efficient multilinear maps from ideal lattices. In: EUROCRYPT 2014, LNCS, vol. 8441, pp 239\u2013256 (2014)","DOI":"10.1007\/978-3-642-55220-5_14"},{"issue":"3","key":"339_CR19","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1080\/00207160.2013.806653","volume":"91","author":"X Lv","year":"2014","unstructured":"Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3), 447\u2013460 (2014)","journal-title":"Int. J. Comput. Math."},{"issue":"2","key":"339_CR20","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Tech. 16(2), 317\u2013323 (2015)","journal-title":"J. Internet Tech."},{"key":"339_CR21","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity based cryptosystems and signature schemes. In: Crypto\u201984, LNCS, vol. 196, pp. 47\u201353 (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"issue":"12","key":"339_CR22","first-page":"3352","volume":"6","author":"G Wei","year":"2012","unstructured":"Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Trans. Internet Inf. Syst. 6(12), 3352\u20133365 (2012)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"339_CR23","doi-asserted-by":"crossref","unstructured":"Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: EUROCRYPT 2009, LNCS, vol. 5479, pp. 153\u2013170 (2009)","DOI":"10.1007\/978-3-642-01001-9_9"},{"key":"339_CR24","doi-asserted-by":"crossref","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farrs, O.: Bridging broadcast encryption and group key agreement. In: ASIACRYPT 2011, LNCS, vol. 7073, pp. 143\u2013160 (2011)","DOI":"10.1007\/978-3-642-25385-0_8"},{"issue":"2","key":"339_CR25","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1109\/TNET.2012.2208201","volume":"21","author":"Q Wu","year":"2013","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manj\u00f3n, J.A.: Fast transmission to remote cooperative groups: a new key management paradigm. IEEE\/ACM Trans. Netw. 21(2), 621\u2013633 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"339_CR26","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"339_CR27","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/TCC.2014.2366152","volume":"2","author":"K Xue","year":"2014","unstructured":"Xue, K., Hong, P.: A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459\u2013470 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"339_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: COCOON 2010, LNCS, vol. 6196, pp. 510\u2013519 (2010)","DOI":"10.1007\/978-3-642-14031-0_54"},{"issue":"15","key":"339_CR29","doi-asserted-by":"crossref","first-page":"3246","DOI":"10.1016\/j.comnet.2011.06.016","volume":"55","author":"L Zhang","year":"2011","unstructured":"Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Netw. 55(15), 3246\u20133255 (2011)","journal-title":"Comput. Netw."},{"key":"339_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, L.: Certificateless one-pass and two-party authenticated key agreement protocol and its extensions. Inf. Sci. 293, 182\u2013195 (2015)","DOI":"10.1016\/j.ins.2014.09.022"},{"key":"339_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Chow, S.S.M., Shi, W.: Secure one-to-group communications: escrow-free ID-based asymmetric group key agreement. In: INSCRYPT 2014, LNCS, vol. 8567, pp. 239\u2013254 (2014)","DOI":"10.1007\/978-3-319-12087-4_15"},{"key":"339_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably secure certificateless authenticated asymmetric group key agreement. In: ISPEC 2014, LNCS, vol. 8434, pp. 496\u2013510 (2014)","DOI":"10.1007\/978-3-319-06320-1_36"},{"key":"339_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2485225","author":"L Zhang","year":"2015","unstructured":"Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. (2015). doi: 10.1109\/TC.2015.2485225","journal-title":"IEEE Trans. Comput."},{"issue":"11","key":"339_CR34","doi-asserted-by":"crossref","first-page":"2352","DOI":"10.1109\/TIFS.2015.2447933","volume":"10","author":"L Zhang","year":"2015","unstructured":"Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352\u20132364 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"339_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2579162","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. (2016). doi: 10.1109\/TITS.2016.2579162","journal-title":"IEEE Trans. Intell. Transp. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-016-0339-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0339-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0339-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0339-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T02:04:01Z","timestamp":1692410641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-016-0339-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,29]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["339"],"URL":"https:\/\/doi.org\/10.1007\/s10207-016-0339-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,29]]}}}